US20030069992A1 - Resolving host name data - Google Patents
Resolving host name data Download PDFInfo
- Publication number
- US20030069992A1 US20030069992A1 US10/074,730 US7473002A US2003069992A1 US 20030069992 A1 US20030069992 A1 US 20030069992A1 US 7473002 A US7473002 A US 7473002A US 2003069992 A1 US2003069992 A1 US 2003069992A1
- Authority
- US
- United States
- Prior art keywords
- host name
- computer system
- requesting computer
- act
- name data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
Definitions
- the present invention relates to resolving host name data on a computer network. More specifically, the present invention relates to systems, methods, and computer program products for resolving host name data that is not natively compatible with host name resolution techniques of an associated computer network.
- Computer systems are often coupled to one another through networks that allow the computer systems to exchange data with each other.
- the majority of these computer systems are not directly coupled in a one-to-one relationship. Instead, these computer systems typically exist in a network environment wherein multiple computer systems are interconnected and each computer system has a communication path to all the other computer systems included in the network. To reliably exchange data on a network where multiple computer systems are interconnected, there must be some way to identify individual computer systems in the network.
- IP addresses are utilized to uniquely identify individual computer systems.
- the first computer system may send the data to the unique address that identifies the second computer system.
- this unique address is in the form of a numeric Internet Protocol (“IP”) address of either 32 or 128 bits.
- IPv4 Internet Protocol version 4
- IPv6 Internet Protocol version 6
- IP address formed in accordance with IPv4 is typically a 32 bit address written in the form of four numbers separated by periods, each number ranging from 0 to 255 such as, for example, “100.101.102.103”.
- addresses are often represented by an alphanumeric domain name.
- “www.testcorporation.com” may represent the same computer system as the numeric IP address 100.101.102.103. That is, the domain name www.testcorporation.com may facilitate access to a computer system that has the numeric IP address 100.101.102.103.
- the Domain Name Service facilities resolving domain names into numerical IP addresses.
- a DNS server receives a DNS request from a computer system on an associated network.
- a DNS request is typically received at port 53 of the DNS server and typically includes a domain name that is contained in one or more Universal Datagram Protocol (“UDP”) packets.
- UDP Universal Datagram Protocol
- the DNS server resolves the domain name into a numeric IP address by searching a table that includes domain names and the numeric IP addresses that are represented by the domain names. After finding an appropriate numeric IP address, the DNS server returns the numeric IP address to the computer system that submitted the request.
- the principles of the present invention provide for resolving host name data that is not natively compatible with host name resolution techniques of an associated computer network.
- a requesting computer system which includes a native host name resolver, is assigned as a name server for itself (i.e., the same requesting computer system). This assignment may be made by configuring a name server address associated with the requesting computer system to a “loop-back” address. This results in name resolution requests sent from the native host name resolver being received by the same requesting computer system without such requests actually physically entering onto any associated networks.
- IPv4 Internet Protocol version 4
- the numeric IP address “127.0.0.1” may be used as a loop-back address and a name server may be a Domain Name Service (“DNS”) server.
- DNS Domain Name Service
- a name resolution port of the requesting computer system for receiving host name data in a host name resolution protocol is monitored.
- This may include a replacement host name resolver module monitoring a name resolution port of the requesting computer system.
- the replacement host name resolver may detect a host name request at the name resolution port of the requesting computer system. Such a host name request may have originated from the native host name resolver. When a host name request is detected, the replacement host name resolver causes the request to be rerouted.
- the replacement host name resolver system may monitor port 53 of the requesting computer system for domain names that represent numeric IP addresses. Such domain names may be contained in one or more Universal Datagram Protocol (“UDP”) packets.
- UDP Universal Datagram Protocol
- Host name data is rerouted to a module (such as a module in a resolving computer system or name resolution server) that may resolve the host name data. This may include rerouting the host name data to a server that may resolve the host name data into a network address.
- host name data in the form of a domain name may be rerouted to a DNS server that may resolve the domain name into a numeric IP address.
- FIG. 1 illustrates an example of a computer system that provides a suitable operating environment for the present invention.
- FIG. 2 illustrates an example of some of the functional components that may facilitate resolving host name data that is not natively compatible with host name resolution techniques of an associated computer network.
- FIG. 3 is a flow diagram illustrating an example of a method for resolving host name data for a computer system.
- the present invention extends to systems, methods, and computer program products for resolving host name data that is not natively compatible with host name data resolution techniques of a computer network.
- a requesting computer system may be assigned as a name server for the requesting computer system through the use of a “loop-back” address.
- a native host name resolver included in the requesting computer system may send host name data that is to be resolved.
- a replacement host name resolver monitors a name resolution port included in the requesting computer system for host name data sent from the native host name resolver. When the replacement host name resolver detects host name data, the replacement host name resolver causes the host data to be rerouted to a module that may resolve the data.
- the embodiments of the present invention may comprise a general-purpose or special-purpose computer system including various computer hardware components, which are discussed in greater detail below.
- Embodiments within the scope of the present invention also include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon.
- Such computer-readable media may be any available media, which is accessible by a general-purpose or special-purpose computer system.
- such computer-readable media can comprise physical storage media such as RAM, ROM, EPROM, CD-ROM, DVD, or other optical storage devices, magnetic disk storage or other magnetic storage devices, or any other media which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which may be accessed by a general-purpose or special-purpose computer system.
- physical storage media such as RAM, ROM, EPROM, CD-ROM, DVD, or other optical storage devices, magnetic disk storage or other magnetic storage devices, or any other media which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which may be accessed by a general-purpose or special-purpose computer system.
- Computer-executable instructions comprise, for example, instructions and data which cause a general-purpose computer system or special-purpose computer system to perform a certain function or group of functions.
- a “computer system” is defined as one or more software modules, one or more hardware modules, or combinations thereof, that work together to perform operations on electronic data.
- the definition of computer system includes the hardware components of a personal computer, as well as software modules, such as the operating system of the personal computer. The physical layout of the modules is not important.
- a computer system may include one or more computers coupled via a computer network.
- a computer system may include a single physical device (such as a mobile phone or Personal Digital Assistant “PDA”) where internal modules (such as a memory and processor) work together to perform operations on electronic data.
- PDA Personal Digital Assistant
- a “port” is defined as an endpoint of a logical communication path.
- the originating computer system may send data from an originating port.
- the destination computer system may receive the data at a destination port.
- Ports may be permanently assigned for the transfer of certain data or may be temporarily assigned on an ad hoc basis.
- the physical representation of a port may include one or more hardware modules, one or more software modules, or a combination thereof.
- the invention may be practiced in network computing environments with many types of computer system configurations, including personal computers, laptop computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, mobile telephones, PDAs, pagers, and the like.
- the invention may also be practiced in distributed computing environments where local and remote computer systems, which are linked (either by hardwired links, wireless links, or by a combination of hardwired or wireless links) through a communication network, both perform tasks.
- program modules may be located in both local and remote memory storage devices.
- FIG. 1 and the following discussion are intended to provide a brief, general description of a suitable computing environment in which the invention may be implemented.
- the invention will be described in the general context of computer-executable instructions, such as program modules, being executed by computer systems.
- program modules include routines, programs, objects, components, data structures, and the like, which perform particular tasks or implement particular abstract data types.
- Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequences of such executable instructions or associated data structures represent examples of corresponding acts for implementing the functions described in such steps.
- a suitable operating environment for the principles of the invention includes a general-purpose computer system in the form of a telephonic device 100 .
- the telephonic device 100 includes a user interface 101 for allowing a user to input information through an input user interface 103 , and to review information presented via an output user interface 102 .
- the output user interface 102 includes a speaker 104 for presenting audio information to the user, as well as a display 105 for presenting visual information to the user.
- the telephonic device 100 may also have an antenna 109 if the telephonic device 100 has wireless capabilities.
- the input user interface 103 may include a microphone 106 for translating audio information into electronic form.
- the input user interface 103 includes dialing controls 107 represented by 112 buttons through which a user may enter information.
- Input user interface 103 also includes navigation control buttons 108 that assist the user in navigating through various entries and options listed on display 105 .
- telephonic device 100 also includes a processor 111 and a memory 112 that are connected to each other and to the user interface 101 via a bus 110 .
- Memory 112 generally represents a wide variety of volatile and/or non-volatile memories and may include types of memory previously discussed. However, the particular type of memory used in telephonic device 100 is not important to the present invention.
- Telephonic device 100 may also include mass storage devices (not shown) similar to those associated with other general-purpose computer systems, including magnetic and/or optical storage devices.
- Program code means comprising one or more program modules may be stored in memory 112 or other storage devices as previously mentioned.
- the one or more program modules may include an operating system 113 , one or more application programs 114 , other program modules 115 , and program data 116 .
- FIG. 1 represents a suitable operating environment for the present invention
- the principles of the present invention may be employed in any system that is capable, with suitable modification if necessary, of implementing the principles of the present invention.
- the environment illustrated in FIG. 1 is illustrative only and by no means represents even a small portion of the wide variety of environments in which the principles of the present invention may be implemented.
- program modules for example, host name resolver modules, as well as associated program data, such as host name data
- program modules may be stored and accessed from any of the computer-readable media associated with telephonic device 100 .
- portions of such modules and portions of associated program data may be included in operating system 113 , application programs 114 , program modules 115 and/or program data 116 , for storage in memory 112 .
- Portions of such modules and associated program data may also be stored in any of the magnetic or optical storage devices previously described.
- Execution of such modules may be performed in a distributed environment as previously described.
- a host name resolver module included in a local computer system may resolve host name data that is to be used by a remote computer system.
- a host name resolver module included in a remote computer system may resolve host name data that is to be used by a local computer system.
- FIG. 2 Shown in FIG. 2 are some of the functional components that may be used to facilitate the resolution of host name data.
- Shown in FIG. 3 is a flow diagram illustrating a method for resolving host name data. The method in FIG. 3 will be discussed with reference to the functional components included in FIG. 2.
- the method in FIG. 3 may begin with a step for receiving host name data from a requesting computer system (step 304 ).
- This may include a replacement host name resolver or a resolving computer system receiving host name data from a requesting computer system.
- Host name data may be received from modules or ports included in the requesting computer system.
- replacement host name resolver 213 may receive host name data from native host name resolver 211 or name resolution port 212 .
- Step 304 may include assigning a requesting computer system as a name server for the requesting computer system (act 301 ). Such an assignment may be facilitated by the use of a “loop-back” address, which essentially causes data to be sent from the computer system to the computer system without the data actually entering onto any associated networks.
- IPv4 Internet Protocol version 4
- DNS primary Domain Name Service
- host name data may be looped-back (arrow 1 ) from native host name resolver 211 to name resolution port 212 without the host name data entering onto any networks associated with requesting computer system 210 .
- host name data may be sent using the User Datagram Protocol (“UDP”) and name resolution port 212 may be port 53 of requesting computer system 210 .
- UDP User Datagram Protocol
- Step 304 may also include monitoring a name resolution port of the requesting computer system for receiving host name data in a host name resolution protocol (act 302 ).
- This may include replacement host name resolver 213 monitoring name resolution port 212 for host name data sent from native host name resolver 211 .
- replacement host name resolver 213 may monitor port 53 of requesting computer system 210 .
- monitoring may be performed by a monitoring computer system and a replacement host name resolver may be included in the monitoring computer system.
- a replacement host name resolver may be included in resolving computer system 220 .
- Act 302 may also be included in a step for resolving host name data that was received from the requesting computer system (step 305 ).
- a replacement host name resolver, monitoring computer system, or other module may resolve host name data that is not natively compatible with available host name resolution techniques.
- Host name data may not be natively compatible with available host name resolution techniques due to a transport protocol used to transport the host name data.
- replacement host name resolver 213 may monitor host name data (arrow 2 ) that was looped-back via UDP. When this occurs, replacement host name resolver 213 has essentially received host name data in a format that is not natively compatible with available host name resolution techniques. That is, the host name data could not be rerouted (arrow 3 ) to resolving computer system 220 due to the lack of support for UDP.
- received host name data may have been modified so that the host name data is compatible with available host name resolution techniques. For example, loop-back of host name data (arrow 1 ) from native host name resolver 211 to name resolution port 212 may be facilitated by UDP. However, redirection of host name data (arrow 3 ) from replacement host name resolver 213 to resolving computer system 220 may be facilitated by the Transmission Control Protocol (“TCP”). Thus, host name data may be received at resolving computer system 220 even if communication via UDP is not supported between requesting computer system 210 and resolving computer system 220 .
- TCP Transmission Control Protocol
- a computer system may specify parameters including an originating address, an originating port, a destination address, a destination port, and a transport protocol.
- requesting computer system 210 has the numeric IP address “101.102.103.104” and that name resolution port 212 is port 53 of requesting computer system 210 .
- native host name resolver 211 may specify parameters associated with the host name data that indicate the originating address is 101.102.103.104, the destination address is 127.0.0.1, the destination port is 53 , and the transport protocol is UDP.
- the originating port may be selected on an ad hoc basis from a group of source ports available to requesting computer system 210 .
- the originating port may be used by a module or computer system to return a network address to native host name resolver 211 .
- Replacement host name resolver 213 may monitor the originating address, originating port, and host name data received at name resolution port 212 .
- Replacement host name resolver 213 may store the originating address and originating port to facilitate returning a network address native host name resolver 211 .
- replacement host name resolver 213 may then specify new parameters for the host name data that indicate the originating address is 101.102.103.104, the destination address is that of resolving computer system 220 , and the transport protocol is TCP.
- the originating port may be selected on an ad hoc basis from a group of source ports available to requesting computer system 210 and the destination port may be selected on an ad hoc basis from a group of source ports available to requesting resolving computer system 220 .
- the originating port and source port may be used to facilitate data transfer between requesting computer system 210 and resolving computer system 220 .
- addresses and ports used in examples throughout this description were selected in an arbitrary manner and that practice of the present invention is not limited to only these addresses and ports. It would be apparent to one skilled in the art, after having reviewed this description, that a wide variety of addresses and ports may be used to facilitate the resolution of host name data.
- a requesting computer system may generate host name data that is incompatible with host name resolution techniques utilized by a resolving computer system. This may occur, for example, if a requesting computer system generates host name data incompatible with Secure DNS techniques used by resolving computer systems.
- host name data received from a requesting computer system may be resolved using Secure DNS even if the requesting computer system is not compatible with secure DNS.
- name server 230 is a secure DNS server and that redirected host name resolver 222 submits host name data (arrow 4 ) to name resolution port 231 in accordance with secure DNS.
- replacement host name resolver 213 receives host name data originating from native host name resolver 211 in a format that is incompatible with secure DNS.
- Replacement host name resolver 213 may modify the host name data to facilitate compatibility with secure DNS.
- Replacement host name resolver 213 may then redirect the compatible host name data (arrow 3 ) to resolving computer system 220 .
- Resolving host name data using secure DNS may be performed in accordance with Internet Engineering Task Force RFC2065, published January 1997.
- computer systems may utilize different addressing schemes.
- a first computer system may be compatible with IPv4 addressing, while a second computer system may be compatible with Internet Protocol version 6 (“IPv6”) addressing.
- IPv6 Internet Protocol version 6
- replacement host name resolver may modify host name data in IPv4 format so the host name data is compatible with name resolution techniques in an IPv6 environment
- replacement host name resolver may modify host name data in IPv6 format so the host name data is compatible with name resolution techniques in an IPv4 environment.
- replacement host name resolver module 213 The logic included in replacement host name resolver module 213 is extensible. By utilizing extensible logic, replacement host name resolver 213 may be configured to perform a wide variety of modifications to received host name data. Thus, in addition to changing communication protocols associated with host name data and performing secure DNS name resolution, replacement host name resolver 213 may be configured to perform host name resolution in accordance with yet to be developed name resolution techniques.
- Step 305 may include rerouting host name data to a module that may resolve the host name data (act 303 ).
- This may include a replacement host name resolver redirecting host name data to a resolving computer system or name server that resolves host name data.
- replacement host name resolver 213 may redirect host name data (arrow 3 ) to resolving computer system 220 .
- replacement host name resolver 213 redirects host name data directly to a computer system that includes name translation data.
- replacement host name resolver 213 may redirect host name data directly to name resolution port 231 (arrow 3 ′).
- a computer system that includes name translation data may transfer a network address directly to a replacement host name resolver.
- name server 230 may transfer a network address directly to replacement host name resolver 213 (arrow 6 ′).
- a resolving computer system such as resolving computer system 220 may be completely bypassed.
- Host name data may be resolved into a network address.
- name server 230 may utilize name translation data 232 to resolve host name data into a network address.
- Name server 230 may return the network address (arrow 5 ) to resolving computer system 220 and resolving computer system 220 may transfer the network address (arrow 6 ) to replacement host name resolver 213 .
- name server 230 may return or transfer a network address directly to replacement host name resolver 213 , thus bypassing resolving computer system 220 .
- Replacement host name resolver 213 may modify a network address to be compatible with native host name resolver 211 .
- a network address received via TCP may be modified for transfer via UDP.
- a network address received in accordance with secure DNS may be modified for transfer in accordance with non-secure DNS. Since the logic included in replacement host name resolver 213 is extensible, it may be that replacement host name resolver 213 performed other operations to modify host name data before redirection or submission. In such embodiments, replacement host name resolver 213 may modify a network address to place the network address in a format that is compatible with native host name resolver 211 . Replacement host name resolver 213 may provide a network address (arrow 7 ) to native host name resolver 211 .
- replacement host name resolver 213 may include a user interface. This user interface may be used to receive parameters from a user so as to configure replacement host name resolver 213 for operation in different network environments.
- host name resolver 213 may be configured to always return the same network address regardless of the host name data that it monitors. This may be done to direct corporate LAN users to a proxy server, to direct wireless users to certain content managed by a mobile service provider, or to direct a computer system to resolve host name data using a proprietary or customized database of network addresses.
- the present invention allows an operating system to resolve host names using a native host name resolver that is otherwise incompatible with host name resolution on a network. Host name resolution is performed without requiring an upgrade to the operating system or a binary replacement of the native host name resolver. This has the advantage of increasing the lifetime of an operating system and/or allowing an operating system to resolve host name data on networks that would otherwise be incompatible with the operating system. This increases the chances that computer systems utilizing such operating systems will function properly with newer and/or proprietary host name resolution techniques.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Communication Control (AREA)
- Ultra Sonic Daignosis Equipment (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
- The present application claims priority from U.S. provisional patent application Serial No. 60/327,107, filed Oct. 4, 2001 and entitled “Transparent Replacement of Native Host Name Resolver,” which provisional application is incorporated herein by reference in its entirety.
- 1. The Field of the Invention
- The present invention relates to resolving host name data on a computer network. More specifically, the present invention relates to systems, methods, and computer program products for resolving host name data that is not natively compatible with host name resolution techniques of an associated computer network.
- 2. Background and Relevant Art
- Computer systems are often coupled to one another through networks that allow the computer systems to exchange data with each other. However, the majority of these computer systems are not directly coupled in a one-to-one relationship. Instead, these computer systems typically exist in a network environment wherein multiple computer systems are interconnected and each computer system has a communication path to all the other computer systems included in the network. To reliably exchange data on a network where multiple computer systems are interconnected, there must be some way to identify individual computer systems in the network.
- In virtually all networks, “network addresses” are utilized to uniquely identify individual computer systems. When a first computer system sends data to a second computer system, the first computer system may send the data to the unique address that identifies the second computer system. In a large number of networks, including the Internet, this unique address is in the form of a numeric Internet Protocol (“IP”) address of either 32 or 128 bits. An IP address may be 32 bits when formed in accordance with Internet Protocol version 4 (“IPv4”) and may be 128 bits when formed in accordance with Internet Protocol version 6 (“IPv6”).
- An IP address formed in accordance with IPv4 is typically a 32 bit address written in the form of four numbers separated by periods, each number ranging from 0 to 255 such as, for example, “100.101.102.103”. However, since human-readable names having associated meaning are easier to remember than a series of numbers, addresses are often represented by an alphanumeric domain name. For example, “www.testcorporation.com” may represent the same computer system as the numeric IP address 100.101.102.103. That is, the domain name www.testcorporation.com may facilitate access to a computer system that has the numeric IP address 100.101.102.103.
- In an IP environment, the Domain Name Service (“DNS”) facilities resolving domain names into numerical IP addresses. During operation, a DNS server receives a DNS request from a computer system on an associated network. A DNS request is typically received at port53 of the DNS server and typically includes a domain name that is contained in one or more Universal Datagram Protocol (“UDP”) packets. The DNS server resolves the domain name into a numeric IP address by searching a table that includes domain names and the numeric IP addresses that are represented by the domain names. After finding an appropriate numeric IP address, the DNS server returns the numeric IP address to the computer system that submitted the request.
- Problems may arise during name resolution if a requesting computer system cannot provide a domain name in a format that is compatible with a DNS server. This may occur, for example, when name resolution is requested over a communication link that does not support UDP. One solution to this problem has been to replace binary components utilized by an operating system when requesting resolution of a domain name. That is, to recode and recompile components of the operating system to make them compatible with newer or proprietary name resolution techniques. This may include replacing Application Program Interfaces (“APIs”) included in an operating system that facilitate host name resolution. However, changes to such APIs may propagate to other parts of the operating system, resulting in the consumption of substantial programming resources in order to modify the APIs.
- Even if substantial programming resources are available, a manufacturer may no longer support an operating system. It is unlikely a manufacturer would create binary replacements for host name resolution modules included in an unsupported operating system. Thus, if the unsupported operating system is widely deployed, it may be costly to upgrade to newer operating systems to gain compatibility with newer or proprietary name resolution techniques.
- Therefore, what are desired are systems, methods, and computer program products for resolving host name data, which is not natively compatible with host name resolution techniques of an associated computer network, in a manner that does not require modification of existing operating system modules.
- The principles of the present invention provide for resolving host name data that is not natively compatible with host name resolution techniques of an associated computer network. A requesting computer system, which includes a native host name resolver, is assigned as a name server for itself (i.e., the same requesting computer system). This assignment may be made by configuring a name server address associated with the requesting computer system to a “loop-back” address. This results in name resolution requests sent from the native host name resolver being received by the same requesting computer system without such requests actually physically entering onto any associated networks. In an Internet Protocol version 4 (“IPv4”) environment, the numeric IP address “127.0.0.1” may be used as a loop-back address and a name server may be a Domain Name Service (“DNS”) server.
- A name resolution port of the requesting computer system for receiving host name data in a host name resolution protocol is monitored. This may include a replacement host name resolver module monitoring a name resolution port of the requesting computer system. The replacement host name resolver may detect a host name request at the name resolution port of the requesting computer system. Such a host name request may have originated from the native host name resolver. When a host name request is detected, the replacement host name resolver causes the request to be rerouted. In an IP environment, the replacement host name resolver system may monitor port53 of the requesting computer system for domain names that represent numeric IP addresses. Such domain names may be contained in one or more Universal Datagram Protocol (“UDP”) packets.
- Host name data is rerouted to a module (such as a module in a resolving computer system or name resolution server) that may resolve the host name data. This may include rerouting the host name data to a server that may resolve the host name data into a network address. In an IP environment, host name data in the form of a domain name may be rerouted to a DNS server that may resolve the domain name into a numeric IP address.
- Additional features and advantages of the invention will be set forth in the description that follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The features and advantages of the invention may be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. These and other features of the present invention will become more fully apparent from the following description and appended claims, or may be learned by the practice of the invention as set forth hereinafter.
- In order to describe the manner in which the above-recited and other advantages and features of the invention can be obtained, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments of the invention and are not, therefore, to be considered to be limiting of its scope, the invention will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
- FIG. 1 illustrates an example of a computer system that provides a suitable operating environment for the present invention.
- FIG. 2 illustrates an example of some of the functional components that may facilitate resolving host name data that is not natively compatible with host name resolution techniques of an associated computer network.
- FIG. 3 is a flow diagram illustrating an example of a method for resolving host name data for a computer system.
- The present invention extends to systems, methods, and computer program products for resolving host name data that is not natively compatible with host name data resolution techniques of a computer network. A requesting computer system may be assigned as a name server for the requesting computer system through the use of a “loop-back” address. A native host name resolver included in the requesting computer system may send host name data that is to be resolved. A replacement host name resolver monitors a name resolution port included in the requesting computer system for host name data sent from the native host name resolver. When the replacement host name resolver detects host name data, the replacement host name resolver causes the host data to be rerouted to a module that may resolve the data.
- The embodiments of the present invention may comprise a general-purpose or special-purpose computer system including various computer hardware components, which are discussed in greater detail below. Embodiments within the scope of the present invention also include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon. Such computer-readable media may be any available media, which is accessible by a general-purpose or special-purpose computer system. By way of example, and not limitation, such computer-readable media can comprise physical storage media such as RAM, ROM, EPROM, CD-ROM, DVD, or other optical storage devices, magnetic disk storage or other magnetic storage devices, or any other media which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which may be accessed by a general-purpose or special-purpose computer system.
- When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a computer system, the connection is properly viewed as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of computer-readable media. Computer-executable instructions comprise, for example, instructions and data which cause a general-purpose computer system or special-purpose computer system to perform a certain function or group of functions.
- In this description and in the following claims, a “computer system” is defined as one or more software modules, one or more hardware modules, or combinations thereof, that work together to perform operations on electronic data. For example, the definition of computer system includes the hardware components of a personal computer, as well as software modules, such as the operating system of the personal computer. The physical layout of the modules is not important. A computer system may include one or more computers coupled via a computer network. Likewise, a computer system may include a single physical device (such as a mobile phone or Personal Digital Assistant “PDA”) where internal modules (such as a memory and processor) work together to perform operations on electronic data.
- In this description and in the following claims, a “port” is defined as an endpoint of a logical communication path. When an originating computer system communicates with a destination computer system, the originating computer system may send data from an originating port. Likewise, the destination computer system may receive the data at a destination port. Ports may be permanently assigned for the transfer of certain data or may be temporarily assigned on an ad hoc basis. The physical representation of a port may include one or more hardware modules, one or more software modules, or a combination thereof.
- Those skilled in the art will appreciate that the invention may be practiced in network computing environments with many types of computer system configurations, including personal computers, laptop computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, mobile telephones, PDAs, pagers, and the like. The invention may also be practiced in distributed computing environments where local and remote computer systems, which are linked (either by hardwired links, wireless links, or by a combination of hardwired or wireless links) through a communication network, both perform tasks. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
- FIG. 1 and the following discussion are intended to provide a brief, general description of a suitable computing environment in which the invention may be implemented. Although not required, the invention will be described in the general context of computer-executable instructions, such as program modules, being executed by computer systems. Generally, program modules include routines, programs, objects, components, data structures, and the like, which perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequences of such executable instructions or associated data structures represent examples of corresponding acts for implementing the functions described in such steps.
- With reference to FIG. 1, a suitable operating environment for the principles of the invention includes a general-purpose computer system in the form of a
telephonic device 100. Thetelephonic device 100 includes a user interface 101 for allowing a user to input information through aninput user interface 103, and to review information presented via anoutput user interface 102. For example, theoutput user interface 102 includes aspeaker 104 for presenting audio information to the user, as well as adisplay 105 for presenting visual information to the user. Thetelephonic device 100 may also have anantenna 109 if thetelephonic device 100 has wireless capabilities. - The
input user interface 103 may include amicrophone 106 for translating audio information into electronic form. In addition, theinput user interface 103 includes dialingcontrols 107 represented by 112 buttons through which a user may enter information.Input user interface 103 also includesnavigation control buttons 108 that assist the user in navigating through various entries and options listed ondisplay 105. - Although user interface101 has the appearance of a mobile telephone, the unseen features of user interface 101 may allow for complex and flexible general-purpose processing capabilities. For example,
telephonic device 100 also includes aprocessor 111 and amemory 112 that are connected to each other and to the user interface 101 via abus 110.Memory 112 generally represents a wide variety of volatile and/or non-volatile memories and may include types of memory previously discussed. However, the particular type of memory used intelephonic device 100 is not important to the present invention.Telephonic device 100 may also include mass storage devices (not shown) similar to those associated with other general-purpose computer systems, including magnetic and/or optical storage devices. - Program code means comprising one or more program modules may be stored in
memory 112 or other storage devices as previously mentioned. The one or more program modules may include anoperating system 113, one ormore application programs 114,other program modules 115, andprogram data 116. - While FIG. 1 represents a suitable operating environment for the present invention, the principles of the present invention may be employed in any system that is capable, with suitable modification if necessary, of implementing the principles of the present invention. The environment illustrated in FIG. 1 is illustrative only and by no means represents even a small portion of the wide variety of environments in which the principles of the present invention may be implemented.
- In accordance with the present invention, program modules, for example, host name resolver modules, as well as associated program data, such as host name data, may be stored and accessed from any of the computer-readable media associated with
telephonic device 100. For example, portions of such modules and portions of associated program data may be included inoperating system 113,application programs 114,program modules 115 and/orprogram data 116, for storage inmemory 112. Portions of such modules and associated program data may also be stored in any of the magnetic or optical storage devices previously described. - Execution of such modules may be performed in a distributed environment as previously described. For example, a host name resolver module included in a local computer system may resolve host name data that is to be used by a remote computer system. Likewise, a host name resolver module included in a remote computer system may resolve host name data that is to be used by a local computer system.
- Shown in FIG. 2 are some of the functional components that may be used to facilitate the resolution of host name data. Shown in FIG. 3 is a flow diagram illustrating a method for resolving host name data. The method in FIG. 3 will be discussed with reference to the functional components included in FIG. 2.
- The method in FIG. 3 may begin with a step for receiving host name data from a requesting computer system (step304). This may include a replacement host name resolver or a resolving computer system receiving host name data from a requesting computer system. Host name data may be received from modules or ports included in the requesting computer system. For example, replacement host name resolver 213 may receive host name data from native host name resolver 211 or
name resolution port 212. -
Step 304 may include assigning a requesting computer system as a name server for the requesting computer system (act 301). Such an assignment may be facilitated by the use of a “loop-back” address, which essentially causes data to be sent from the computer system to the computer system without the data actually entering onto any associated networks. In an Internet Protocol version 4 (“IPv4”) environment, a primary Domain Name Service (“DNS”) server may be set to the numeric IP loop-back address “127.0.0.1”. Thus, host name data may be looped-back (arrow 1) from native host name resolver 211 to nameresolution port 212 without the host name data entering onto any networks associated with requestingcomputer system 210. In an IPv4 environment, host name data may be sent using the User Datagram Protocol (“UDP”) andname resolution port 212 may be port 53 of requestingcomputer system 210. -
Step 304 may also include monitoring a name resolution port of the requesting computer system for receiving host name data in a host name resolution protocol (act 302). This may include replacement host name resolver 213 monitoringname resolution port 212 for host name data sent from nativehost name resolver 211. In an IP environment, replacement host name resolver 213 may monitor port 53 of requestingcomputer system 210. In alternate embodiments, monitoring may be performed by a monitoring computer system and a replacement host name resolver may be included in the monitoring computer system. For example, a replacement host name resolver may be included in resolvingcomputer system 220. -
Act 302 may also be included in a step for resolving host name data that was received from the requesting computer system (step 305). A replacement host name resolver, monitoring computer system, or other module may resolve host name data that is not natively compatible with available host name resolution techniques. Host name data may not be natively compatible with available host name resolution techniques due to a transport protocol used to transport the host name data. - For example, assume that communication via UDP is not supported between requesting
computer system 210 and resolvingcomputer system 220. In some embodiments, replacement host name resolver 213 may monitor host name data (arrow 2) that was looped-back via UDP. When this occurs, replacement host name resolver 213 has essentially received host name data in a format that is not natively compatible with available host name resolution techniques. That is, the host name data could not be rerouted (arrow 3) to resolvingcomputer system 220 due to the lack of support for UDP. - In some embodiments, received host name data may have been modified so that the host name data is compatible with available host name resolution techniques. For example, loop-back of host name data (arrow1) from native host name resolver 211 to name
resolution port 212 may be facilitated by UDP. However, redirection of host name data (arrow 3) from replacement host name resolver 213 to resolvingcomputer system 220 may be facilitated by the Transmission Control Protocol (“TCP”). Thus, host name data may be received at resolvingcomputer system 220 even if communication via UDP is not supported between requestingcomputer system 210 and resolvingcomputer system 220. - When transferring data in an IPv4 environment, a computer system may specify parameters including an originating address, an originating port, a destination address, a destination port, and a transport protocol. Assume that requesting
computer system 210 has the numeric IP address “101.102.103.104” and thatname resolution port 212 is port 53 of requestingcomputer system 210. To cause the loop-back of host name data (arrow 1), native host name resolver 211 may specify parameters associated with the host name data that indicate the originating address is 101.102.103.104, the destination address is 127.0.0.1, the destination port is 53, and the transport protocol is UDP. The originating port may be selected on an ad hoc basis from a group of source ports available to requestingcomputer system 210. The originating port may be used by a module or computer system to return a network address to nativehost name resolver 211. Replacement host name resolver 213 may monitor the originating address, originating port, and host name data received atname resolution port 212. - Replacement host name resolver213 may store the originating address and originating port to facilitate returning a network address native
host name resolver 211. To cause redirection of the host name data (arrow 3), replacement host name resolver 213 may then specify new parameters for the host name data that indicate the originating address is 101.102.103.104, the destination address is that of resolvingcomputer system 220, and the transport protocol is TCP. The originating port may be selected on an ad hoc basis from a group of source ports available to requestingcomputer system 210 and the destination port may be selected on an ad hoc basis from a group of source ports available to requesting resolvingcomputer system 220. The originating port and source port may be used to facilitate data transfer between requestingcomputer system 210 and resolvingcomputer system 220. - It should be understood that the addresses and ports used in examples throughout this description were selected in an arbitrary manner and that practice of the present invention is not limited to only these addresses and ports. It would be apparent to one skilled in the art, after having reviewed this description, that a wide variety of addresses and ports may be used to facilitate the resolution of host name data.
- Other incompatibilities between host name data and name resolution techniques may occur. In some embodiments, a requesting computer system may generate host name data that is incompatible with host name resolution techniques utilized by a resolving computer system. This may occur, for example, if a requesting computer system generates host name data incompatible with Secure DNS techniques used by resolving computer systems.
- In accordance with the present invention, host name data received from a requesting computer system may be resolved using Secure DNS even if the requesting computer system is not compatible with secure DNS. For example, in FIG. 2, assume that
name server 230 is a secure DNS server and that redirected host name resolver 222 submits host name data (arrow 4) toname resolution port 231 in accordance with secure DNS. If replacement host name resolver 213 receives host name data originating from native host name resolver 211 in a format that is incompatible with secure DNS. Replacement host name resolver 213 may modify the host name data to facilitate compatibility with secure DNS. Replacement host name resolver 213 may then redirect the compatible host name data (arrow 3) to resolvingcomputer system 220. Resolving host name data using secure DNS may be performed in accordance with Internet Engineering Task Force RFC2065, published January 1997. - In some embodiments, computer systems may utilize different addressing schemes. A first computer system may be compatible with IPv4 addressing, while a second computer system may be compatible with Internet Protocol version 6 (“IPv6”) addressing. In accordance with the present invention, replacement host name resolver may modify host name data in IPv4 format so the host name data is compatible with name resolution techniques in an IPv6 environment Likewise, replacement host name resolver may modify host name data in IPv6 format so the host name data is compatible with name resolution techniques in an IPv4 environment.
- The logic included in replacement host
name resolver module 213 is extensible. By utilizing extensible logic, replacement host name resolver 213 may be configured to perform a wide variety of modifications to received host name data. Thus, in addition to changing communication protocols associated with host name data and performing secure DNS name resolution, replacement host name resolver 213 may be configured to perform host name resolution in accordance with yet to be developed name resolution techniques. -
Step 305 may include rerouting host name data to a module that may resolve the host name data (act 303). This may include a replacement host name resolver redirecting host name data to a resolving computer system or name server that resolves host name data. Illustrated in FIG. 2, replacement host name resolver 213 may redirect host name data (arrow 3) to resolvingcomputer system 220. However, it may be that replacement host name resolver 213 redirects host name data directly to a computer system that includes name translation data. For example, replacement host name resolver 213 may redirect host name data directly to name resolution port 231 (arrow 3′). Likewise, a computer system that includes name translation data may transfer a network address directly to a replacement host name resolver. For example,name server 230 may transfer a network address directly to replacement host name resolver 213 (arrow 6′). In such embodiments, a resolving computer system, such as resolvingcomputer system 220 may be completely bypassed. - Host name data may be resolved into a network address. For example,
name server 230 may utilizename translation data 232 to resolve host name data into a network address.Name server 230 may return the network address (arrow 5) to resolvingcomputer system 220 and resolvingcomputer system 220 may transfer the network address (arrow 6) to replacementhost name resolver 213. Likewise,name server 230 may return or transfer a network address directly to replacement host name resolver 213, thus bypassing resolvingcomputer system 220. - Replacement host name resolver213 may modify a network address to be compatible with native
host name resolver 211. A network address received via TCP may be modified for transfer via UDP. Likewise, a network address received in accordance with secure DNS may be modified for transfer in accordance with non-secure DNS. Since the logic included in replacement host name resolver 213 is extensible, it may be that replacement host name resolver 213 performed other operations to modify host name data before redirection or submission. In such embodiments, replacement host name resolver 213 may modify a network address to place the network address in a format that is compatible with nativehost name resolver 211. Replacement host name resolver 213 may provide a network address (arrow 7) to nativehost name resolver 211. - In some embodiments, replacement host name resolver213 may include a user interface. This user interface may be used to receive parameters from a user so as to configure replacement host name resolver 213 for operation in different network environments. For example, host name resolver 213 may be configured to always return the same network address regardless of the host name data that it monitors. This may be done to direct corporate LAN users to a proxy server, to direct wireless users to certain content managed by a mobile service provider, or to direct a computer system to resolve host name data using a proprietary or customized database of network addresses.
- The present invention allows an operating system to resolve host names using a native host name resolver that is otherwise incompatible with host name resolution on a network. Host name resolution is performed without requiring an upgrade to the operating system or a binary replacement of the native host name resolver. This has the advantage of increasing the lifetime of an operating system and/or allowing an operating system to resolve host name data on networks that would otherwise be incompatible with the operating system. This increases the chances that computer systems utilizing such operating systems will function properly with newer and/or proprietary host name resolution techniques.
- The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes, which come within the meaning and range of equivalency of the claims, are to be embraced within their scope.
Claims (28)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/074,730 US7284056B2 (en) | 2001-10-04 | 2002-02-13 | Resolving host name data |
AT02022451T ATE470308T1 (en) | 2001-10-04 | 2002-10-04 | HOSTNAME RESOLUTION METHOD |
DE60236570T DE60236570D1 (en) | 2001-10-04 | 2002-10-04 | Method for resolving a host name |
EP02022451A EP1303108B1 (en) | 2001-10-04 | 2002-10-04 | Method for resolving host name |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US32710701P | 2001-10-04 | 2001-10-04 | |
US10/074,730 US7284056B2 (en) | 2001-10-04 | 2002-02-13 | Resolving host name data |
Publications (2)
Publication Number | Publication Date |
---|---|
US20030069992A1 true US20030069992A1 (en) | 2003-04-10 |
US7284056B2 US7284056B2 (en) | 2007-10-16 |
Family
ID=26755997
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/074,730 Expired - Fee Related US7284056B2 (en) | 2001-10-04 | 2002-02-13 | Resolving host name data |
Country Status (4)
Country | Link |
---|---|
US (1) | US7284056B2 (en) |
EP (1) | EP1303108B1 (en) |
AT (1) | ATE470308T1 (en) |
DE (1) | DE60236570D1 (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6826624B1 (en) * | 1999-12-09 | 2004-11-30 | International Business Machines Corporation | Method and apparatus for network resource access request redirection |
US20050015644A1 (en) * | 2003-06-30 | 2005-01-20 | Microsoft Corporation | Network connection agents and troubleshooters |
US20080028463A1 (en) * | 2005-10-27 | 2008-01-31 | Damballa, Inc. | Method and system for detecting and responding to attacking networks |
US20080162702A1 (en) * | 2006-12-29 | 2008-07-03 | Verizon Services Organization Inc. | Automatic detection and establishment of network connection |
US20100037314A1 (en) * | 2008-08-11 | 2010-02-11 | Perdisci Roberto | Method and system for detecting malicious and/or botnet-related domain names |
US20110167495A1 (en) * | 2010-01-06 | 2011-07-07 | Antonakakis Emmanouil | Method and system for detecting malware |
US8631489B2 (en) | 2011-02-01 | 2014-01-14 | Damballa, Inc. | Method and system for detecting malicious domain names at an upper DNS hierarchy |
US8826438B2 (en) | 2010-01-19 | 2014-09-02 | Damballa, Inc. | Method and system for network-based detecting of malware from behavioral clustering |
US9166994B2 (en) | 2012-08-31 | 2015-10-20 | Damballa, Inc. | Automation discovery to identify malicious activity |
US9516058B2 (en) | 2010-08-10 | 2016-12-06 | Damballa, Inc. | Method and system for determining whether domain names are legitimate or malicious |
US9680861B2 (en) | 2012-08-31 | 2017-06-13 | Damballa, Inc. | Historical analysis to identify malicious activity |
US9894088B2 (en) | 2012-08-31 | 2018-02-13 | Damballa, Inc. | Data mining to identify malicious activity |
US9930065B2 (en) | 2015-03-25 | 2018-03-27 | University Of Georgia Research Foundation, Inc. | Measuring, categorizing, and/or mitigating malware distribution paths |
US10050986B2 (en) | 2013-06-14 | 2018-08-14 | Damballa, Inc. | Systems and methods for traffic classification |
US10084806B2 (en) | 2012-08-31 | 2018-09-25 | Damballa, Inc. | Traffic simulation to identify malicious activity |
US10547674B2 (en) | 2012-08-27 | 2020-01-28 | Help/Systems, Llc | Methods and systems for network flow analysis |
Families Citing this family (83)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4010830B2 (en) * | 2002-03-05 | 2007-11-21 | 富士通株式会社 | Communication apparatus and network system |
WO2005096160A1 (en) * | 2004-03-16 | 2005-10-13 | Thomson Licensing | Proxy dns for web browser request redirection in public hotspot accesses |
US7493403B2 (en) * | 2006-03-13 | 2009-02-17 | Markmonitor Inc. | Domain name ownership validation |
US7941741B1 (en) * | 2006-07-11 | 2011-05-10 | Juniper Networks, Inc. | Dynamically manipulating content to force web browsers to open more connections |
US7991910B2 (en) | 2008-11-17 | 2011-08-02 | Amazon Technologies, Inc. | Updating routing information based on client location |
US8028090B2 (en) | 2008-11-17 | 2011-09-27 | Amazon Technologies, Inc. | Request routing utilizing client location information |
US8447831B1 (en) | 2008-03-31 | 2013-05-21 | Amazon Technologies, Inc. | Incentive driven content delivery |
US8601090B1 (en) | 2008-03-31 | 2013-12-03 | Amazon Technologies, Inc. | Network resource identification |
US8606996B2 (en) | 2008-03-31 | 2013-12-10 | Amazon Technologies, Inc. | Cache optimization |
US7970820B1 (en) | 2008-03-31 | 2011-06-28 | Amazon Technologies, Inc. | Locality based content distribution |
US7962597B2 (en) | 2008-03-31 | 2011-06-14 | Amazon Technologies, Inc. | Request routing based on class |
US8156243B2 (en) | 2008-03-31 | 2012-04-10 | Amazon Technologies, Inc. | Request routing |
US8533293B1 (en) | 2008-03-31 | 2013-09-10 | Amazon Technologies, Inc. | Client side cache management |
US8321568B2 (en) | 2008-03-31 | 2012-11-27 | Amazon Technologies, Inc. | Content management |
US9912740B2 (en) | 2008-06-30 | 2018-03-06 | Amazon Technologies, Inc. | Latency measurement in resource requests |
US7925782B2 (en) | 2008-06-30 | 2011-04-12 | Amazon Technologies, Inc. | Request routing using network computing components |
US9407681B1 (en) | 2010-09-28 | 2016-08-02 | Amazon Technologies, Inc. | Latency measurement in resource requests |
US8060616B1 (en) | 2008-11-17 | 2011-11-15 | Amazon Technologies, Inc. | Managing CDN registration by a storage provider |
US8065417B1 (en) | 2008-11-17 | 2011-11-22 | Amazon Technologies, Inc. | Service provider registration by a content broker |
US8122098B1 (en) | 2008-11-17 | 2012-02-21 | Amazon Technologies, Inc. | Managing content delivery network service providers by a content broker |
US8073940B1 (en) | 2008-11-17 | 2011-12-06 | Amazon Technologies, Inc. | Managing content delivery network service providers |
US8732309B1 (en) | 2008-11-17 | 2014-05-20 | Amazon Technologies, Inc. | Request routing utilizing cost information |
US8521880B1 (en) | 2008-11-17 | 2013-08-27 | Amazon Technologies, Inc. | Managing content delivery network service providers |
US8756341B1 (en) | 2009-03-27 | 2014-06-17 | Amazon Technologies, Inc. | Request routing utilizing popularity information |
US8688837B1 (en) | 2009-03-27 | 2014-04-01 | Amazon Technologies, Inc. | Dynamically translating resource identifiers for request routing using popularity information |
US8521851B1 (en) | 2009-03-27 | 2013-08-27 | Amazon Technologies, Inc. | DNS query processing using resource identifiers specifying an application broker |
US8412823B1 (en) | 2009-03-27 | 2013-04-02 | Amazon Technologies, Inc. | Managing tracking information entries in resource cache components |
US8782236B1 (en) | 2009-06-16 | 2014-07-15 | Amazon Technologies, Inc. | Managing resources using resource expiration data |
US8397073B1 (en) | 2009-09-04 | 2013-03-12 | Amazon Technologies, Inc. | Managing secure content in a content delivery network |
US8433771B1 (en) | 2009-10-02 | 2013-04-30 | Amazon Technologies, Inc. | Distribution network with forward resource propagation |
US9495338B1 (en) | 2010-01-28 | 2016-11-15 | Amazon Technologies, Inc. | Content distribution network |
US9003035B1 (en) | 2010-09-28 | 2015-04-07 | Amazon Technologies, Inc. | Point of presence management in request routing |
US9712484B1 (en) | 2010-09-28 | 2017-07-18 | Amazon Technologies, Inc. | Managing request routing information utilizing client identifiers |
US8468247B1 (en) | 2010-09-28 | 2013-06-18 | Amazon Technologies, Inc. | Point of presence management in request routing |
US8819283B2 (en) | 2010-09-28 | 2014-08-26 | Amazon Technologies, Inc. | Request routing in a networked environment |
US10097398B1 (en) | 2010-09-28 | 2018-10-09 | Amazon Technologies, Inc. | Point of presence management in request routing |
US8577992B1 (en) | 2010-09-28 | 2013-11-05 | Amazon Technologies, Inc. | Request routing management based on network components |
US10958501B1 (en) | 2010-09-28 | 2021-03-23 | Amazon Technologies, Inc. | Request routing information based on client IP groupings |
US8452874B2 (en) | 2010-11-22 | 2013-05-28 | Amazon Technologies, Inc. | Request routing processing |
US9391949B1 (en) | 2010-12-03 | 2016-07-12 | Amazon Technologies, Inc. | Request routing processing |
US10467042B1 (en) | 2011-04-27 | 2019-11-05 | Amazon Technologies, Inc. | Optimized deployment based upon customer locality |
US8904009B1 (en) | 2012-02-10 | 2014-12-02 | Amazon Technologies, Inc. | Dynamic content delivery |
US10021179B1 (en) | 2012-02-21 | 2018-07-10 | Amazon Technologies, Inc. | Local resource delivery network |
US10623408B1 (en) | 2012-04-02 | 2020-04-14 | Amazon Technologies, Inc. | Context sensitive object management |
US9154551B1 (en) | 2012-06-11 | 2015-10-06 | Amazon Technologies, Inc. | Processing DNS queries to identify pre-processing information |
US9525659B1 (en) | 2012-09-04 | 2016-12-20 | Amazon Technologies, Inc. | Request routing utilizing point of presence load information |
US9323577B2 (en) | 2012-09-20 | 2016-04-26 | Amazon Technologies, Inc. | Automated profiling of resource usage |
US10205698B1 (en) * | 2012-12-19 | 2019-02-12 | Amazon Technologies, Inc. | Source-dependent address resolution |
US9294391B1 (en) | 2013-06-04 | 2016-03-22 | Amazon Technologies, Inc. | Managing network computing components utilizing request routing |
US9338127B2 (en) | 2013-09-11 | 2016-05-10 | International Business Machines Corparation | Browser based hostname resolution for non-DNS (domain name service) and/or different DNS environments |
CN104010051B (en) * | 2014-06-05 | 2017-12-08 | 胡汉强 | A kind of method and management server for accessing network |
US10033627B1 (en) | 2014-12-18 | 2018-07-24 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US10091096B1 (en) | 2014-12-18 | 2018-10-02 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US10097448B1 (en) | 2014-12-18 | 2018-10-09 | Amazon Technologies, Inc. | Routing mode and point-of-presence selection service |
US10225326B1 (en) | 2015-03-23 | 2019-03-05 | Amazon Technologies, Inc. | Point of presence based data uploading |
US9819567B1 (en) | 2015-03-30 | 2017-11-14 | Amazon Technologies, Inc. | Traffic surge management for points of presence |
US9887932B1 (en) | 2015-03-30 | 2018-02-06 | Amazon Technologies, Inc. | Traffic surge management for points of presence |
US9887931B1 (en) | 2015-03-30 | 2018-02-06 | Amazon Technologies, Inc. | Traffic surge management for points of presence |
US9832141B1 (en) | 2015-05-13 | 2017-11-28 | Amazon Technologies, Inc. | Routing based request correlation |
US10097566B1 (en) | 2015-07-31 | 2018-10-09 | Amazon Technologies, Inc. | Identifying targets of network attacks |
US9794281B1 (en) | 2015-09-24 | 2017-10-17 | Amazon Technologies, Inc. | Identifying sources of network attacks |
US9774619B1 (en) | 2015-09-24 | 2017-09-26 | Amazon Technologies, Inc. | Mitigating network attacks |
US9742795B1 (en) | 2015-09-24 | 2017-08-22 | Amazon Technologies, Inc. | Mitigating network attacks |
US10270878B1 (en) | 2015-11-10 | 2019-04-23 | Amazon Technologies, Inc. | Routing for origin-facing points of presence |
US10257307B1 (en) | 2015-12-11 | 2019-04-09 | Amazon Technologies, Inc. | Reserved cache space in content delivery networks |
US10049051B1 (en) | 2015-12-11 | 2018-08-14 | Amazon Technologies, Inc. | Reserved cache space in content delivery networks |
US10348639B2 (en) | 2015-12-18 | 2019-07-09 | Amazon Technologies, Inc. | Use of virtual endpoints to improve data transmission rates |
US10075551B1 (en) | 2016-06-06 | 2018-09-11 | Amazon Technologies, Inc. | Request management for hierarchical cache |
US10110694B1 (en) | 2016-06-29 | 2018-10-23 | Amazon Technologies, Inc. | Adaptive transfer rate for retrieving content from a server |
US9992086B1 (en) | 2016-08-23 | 2018-06-05 | Amazon Technologies, Inc. | External health checking of virtual private cloud network environments |
US10033691B1 (en) | 2016-08-24 | 2018-07-24 | Amazon Technologies, Inc. | Adaptive resolution of domain name requests in virtual private cloud network environments |
US10505961B2 (en) | 2016-10-05 | 2019-12-10 | Amazon Technologies, Inc. | Digitally signed network address |
US10831549B1 (en) | 2016-12-27 | 2020-11-10 | Amazon Technologies, Inc. | Multi-region request-driven code execution system |
US10372499B1 (en) | 2016-12-27 | 2019-08-06 | Amazon Technologies, Inc. | Efficient region selection system for executing request-driven code |
US10938884B1 (en) | 2017-01-30 | 2021-03-02 | Amazon Technologies, Inc. | Origin server cloaking using virtual private cloud network environments |
US10503613B1 (en) | 2017-04-21 | 2019-12-10 | Amazon Technologies, Inc. | Efficient serving of resources during server unavailability |
US11075987B1 (en) | 2017-06-12 | 2021-07-27 | Amazon Technologies, Inc. | Load estimating content delivery network |
US10447648B2 (en) | 2017-06-19 | 2019-10-15 | Amazon Technologies, Inc. | Assignment of a POP to a DNS resolver based on volume of communications over a link between client devices and the POP |
US11032127B2 (en) * | 2017-06-26 | 2021-06-08 | Verisign, Inc. | Resilient domain name service (DNS) resolution when an authoritative name server is unavailable |
US10742593B1 (en) | 2017-09-25 | 2020-08-11 | Amazon Technologies, Inc. | Hybrid content request routing system |
US10592578B1 (en) | 2018-03-07 | 2020-03-17 | Amazon Technologies, Inc. | Predictive content push-enabled content delivery network |
US10862852B1 (en) | 2018-11-16 | 2020-12-08 | Amazon Technologies, Inc. | Resolution of domain name requests in heterogeneous network environments |
US11025747B1 (en) | 2018-12-12 | 2021-06-01 | Amazon Technologies, Inc. | Content request pattern-based routing system |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5729689A (en) * | 1995-04-25 | 1998-03-17 | Microsoft Corporation | Network naming services proxy agent |
US5777989A (en) * | 1995-12-19 | 1998-07-07 | International Business Machines Corporation | TCP/IP host name resolution for machines on several domains |
US5799016A (en) * | 1996-01-11 | 1998-08-25 | U S West, Inc. | Network addressing scheme encoding communication channel information |
US6119171A (en) * | 1998-01-29 | 2000-09-12 | Ip Dynamics, Inc. | Domain name routing |
US6119234A (en) * | 1997-06-27 | 2000-09-12 | Sun Microsystems, Inc. | Method and apparatus for client-host communication over a computer network |
US6256671B1 (en) * | 1998-06-24 | 2001-07-03 | Nortel Networks Limited | Method and apparatus for providing network access control using a domain name system |
US6314469B1 (en) * | 1999-02-26 | 2001-11-06 | I-Dns.Net International Pte Ltd | Multi-language domain name service |
US20020027915A1 (en) * | 2000-09-01 | 2002-03-07 | George Foti | System and method for address resolution in internet protocol (IP) -based networks |
US6449657B2 (en) * | 1999-08-06 | 2002-09-10 | Namezero.Com, Inc. | Internet hosting system |
US20020154624A1 (en) * | 2001-04-18 | 2002-10-24 | Hitachi. Ltd. | Method of translating protecol at translator, method of providing protocol translation information at translation server, and address translation server |
US6480508B1 (en) * | 1999-05-12 | 2002-11-12 | Westell, Inc. | Router-based domain name system proxy agent using address translation |
US20040093434A1 (en) * | 2001-03-08 | 2004-05-13 | Peter Hovell | Address translator |
US6795858B1 (en) * | 2000-12-29 | 2004-09-21 | Cisco Technology, Inc. | Method and apparatus for metric based server selection |
US6810411B1 (en) * | 1999-09-13 | 2004-10-26 | Intel Corporation | Method and system for selecting a host in a communications network |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100528156B1 (en) | 1997-03-12 | 2005-11-15 | 노마딕스, 인코포레이티드 | Nomadic Translator or Router |
WO2000027092A1 (en) | 1998-10-30 | 2000-05-11 | Eicon Technology Corporation | Dns relay module in a digital network modem |
-
2002
- 2002-02-13 US US10/074,730 patent/US7284056B2/en not_active Expired - Fee Related
- 2002-10-04 AT AT02022451T patent/ATE470308T1/en not_active IP Right Cessation
- 2002-10-04 DE DE60236570T patent/DE60236570D1/en not_active Expired - Lifetime
- 2002-10-04 EP EP02022451A patent/EP1303108B1/en not_active Expired - Lifetime
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5729689A (en) * | 1995-04-25 | 1998-03-17 | Microsoft Corporation | Network naming services proxy agent |
US5777989A (en) * | 1995-12-19 | 1998-07-07 | International Business Machines Corporation | TCP/IP host name resolution for machines on several domains |
US5799016A (en) * | 1996-01-11 | 1998-08-25 | U S West, Inc. | Network addressing scheme encoding communication channel information |
US6119234A (en) * | 1997-06-27 | 2000-09-12 | Sun Microsystems, Inc. | Method and apparatus for client-host communication over a computer network |
US6119171A (en) * | 1998-01-29 | 2000-09-12 | Ip Dynamics, Inc. | Domain name routing |
US6256671B1 (en) * | 1998-06-24 | 2001-07-03 | Nortel Networks Limited | Method and apparatus for providing network access control using a domain name system |
US6314469B1 (en) * | 1999-02-26 | 2001-11-06 | I-Dns.Net International Pte Ltd | Multi-language domain name service |
US6480508B1 (en) * | 1999-05-12 | 2002-11-12 | Westell, Inc. | Router-based domain name system proxy agent using address translation |
US6449657B2 (en) * | 1999-08-06 | 2002-09-10 | Namezero.Com, Inc. | Internet hosting system |
US6810411B1 (en) * | 1999-09-13 | 2004-10-26 | Intel Corporation | Method and system for selecting a host in a communications network |
US20020027915A1 (en) * | 2000-09-01 | 2002-03-07 | George Foti | System and method for address resolution in internet protocol (IP) -based networks |
US6795858B1 (en) * | 2000-12-29 | 2004-09-21 | Cisco Technology, Inc. | Method and apparatus for metric based server selection |
US20040093434A1 (en) * | 2001-03-08 | 2004-05-13 | Peter Hovell | Address translator |
US20020154624A1 (en) * | 2001-04-18 | 2002-10-24 | Hitachi. Ltd. | Method of translating protecol at translator, method of providing protocol translation information at translation server, and address translation server |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6826624B1 (en) * | 1999-12-09 | 2004-11-30 | International Business Machines Corporation | Method and apparatus for network resource access request redirection |
US20050015644A1 (en) * | 2003-06-30 | 2005-01-20 | Microsoft Corporation | Network connection agents and troubleshooters |
US20080028463A1 (en) * | 2005-10-27 | 2008-01-31 | Damballa, Inc. | Method and system for detecting and responding to attacking networks |
US10044748B2 (en) | 2005-10-27 | 2018-08-07 | Georgia Tech Research Corporation | Methods and systems for detecting compromised computers |
US9306969B2 (en) | 2005-10-27 | 2016-04-05 | Georgia Tech Research Corporation | Method and systems for detecting compromised networks and/or computers |
US8566928B2 (en) | 2005-10-27 | 2013-10-22 | Georgia Tech Research Corporation | Method and system for detecting and responding to attacking networks |
US8281015B2 (en) * | 2006-12-29 | 2012-10-02 | Verizon Patent And Licensing Inc. | Automatic detection and establishment of network connection |
US20080162702A1 (en) * | 2006-12-29 | 2008-07-03 | Verizon Services Organization Inc. | Automatic detection and establishment of network connection |
US20100037314A1 (en) * | 2008-08-11 | 2010-02-11 | Perdisci Roberto | Method and system for detecting malicious and/or botnet-related domain names |
US10027688B2 (en) | 2008-08-11 | 2018-07-17 | Damballa, Inc. | Method and system for detecting malicious and/or botnet-related domain names |
US10257212B2 (en) | 2010-01-06 | 2019-04-09 | Help/Systems, Llc | Method and system for detecting malware |
US8578497B2 (en) | 2010-01-06 | 2013-11-05 | Damballa, Inc. | Method and system for detecting malware |
US20110167495A1 (en) * | 2010-01-06 | 2011-07-07 | Antonakakis Emmanouil | Method and system for detecting malware |
US9525699B2 (en) | 2010-01-06 | 2016-12-20 | Damballa, Inc. | Method and system for detecting malware |
US9948671B2 (en) | 2010-01-19 | 2018-04-17 | Damballa, Inc. | Method and system for network-based detecting of malware from behavioral clustering |
US8826438B2 (en) | 2010-01-19 | 2014-09-02 | Damballa, Inc. | Method and system for network-based detecting of malware from behavioral clustering |
US9516058B2 (en) | 2010-08-10 | 2016-12-06 | Damballa, Inc. | Method and system for determining whether domain names are legitimate or malicious |
US9686291B2 (en) | 2011-02-01 | 2017-06-20 | Damballa, Inc. | Method and system for detecting malicious domain names at an upper DNS hierarchy |
US8631489B2 (en) | 2011-02-01 | 2014-01-14 | Damballa, Inc. | Method and system for detecting malicious domain names at an upper DNS hierarchy |
US10547674B2 (en) | 2012-08-27 | 2020-01-28 | Help/Systems, Llc | Methods and systems for network flow analysis |
US9166994B2 (en) | 2012-08-31 | 2015-10-20 | Damballa, Inc. | Automation discovery to identify malicious activity |
US10084806B2 (en) | 2012-08-31 | 2018-09-25 | Damballa, Inc. | Traffic simulation to identify malicious activity |
US9894088B2 (en) | 2012-08-31 | 2018-02-13 | Damballa, Inc. | Data mining to identify malicious activity |
US9680861B2 (en) | 2012-08-31 | 2017-06-13 | Damballa, Inc. | Historical analysis to identify malicious activity |
US10050986B2 (en) | 2013-06-14 | 2018-08-14 | Damballa, Inc. | Systems and methods for traffic classification |
US9930065B2 (en) | 2015-03-25 | 2018-03-27 | University Of Georgia Research Foundation, Inc. | Measuring, categorizing, and/or mitigating malware distribution paths |
Also Published As
Publication number | Publication date |
---|---|
EP1303108A3 (en) | 2006-01-11 |
US7284056B2 (en) | 2007-10-16 |
ATE470308T1 (en) | 2010-06-15 |
DE60236570D1 (en) | 2010-07-15 |
EP1303108A2 (en) | 2003-04-16 |
EP1303108B1 (en) | 2010-06-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7284056B2 (en) | Resolving host name data | |
US7779158B2 (en) | Network device | |
WO2012053162A1 (en) | Name-database server, name-resolution system, entry-search method, and entry-search program | |
US20040190549A1 (en) | Allowing IPv4 clients to communicate over an IPv6 network when behind a network address translator with reduced server workload | |
US20020059405A1 (en) | Methods systems and computer program products for the automated discovery of a services menu | |
JP5812008B2 (en) | Name database server, name resolution system, entry search method, and entry search program | |
US20110191763A1 (en) | Feature Manager System for Facilitating Communication and Shared Functionality Among Components | |
KR20040034612A (en) | Method and system for two-way initiated data communication with wireless devices | |
JP2003283578A (en) | Protocol converting method and apparatus | |
US7532620B2 (en) | Routing table synchronization method, network apparatus, and routing table synchronization program | |
US20010051981A1 (en) | Methods and systems for discovering object-exchange resources on a network | |
US9485140B2 (en) | Automatic proxy setting modification | |
KR101029457B1 (en) | Mobility Management based on Network Address Translation | |
US6724724B1 (en) | System and method for resolving an electronic address | |
US20030158917A1 (en) | Modifying system configuration based on parameters received from an infrastructure | |
US20050034131A1 (en) | Apparatus and methods for providing communication between systems having different protocol versions | |
US7593349B2 (en) | Method and arrangement for configuration of a device in a data network | |
CN114650271B (en) | Global load DNS neighbor site learning method and device | |
US20030046428A1 (en) | Method for generating domain name for device intermittently connected to fixed network | |
US11201851B2 (en) | Information processing device and non-transitory computer readable medium | |
US7185097B1 (en) | Encoding addresses in a communication system | |
US20060136594A1 (en) | Network setting configuration systems and methods | |
Reese | Learning Network Programming with Java | |
WO2023001383A1 (en) | Proxy dns server and methods of running ipv4 applications in an ipv6 only environment | |
JP2001345833A (en) | Data-transmitting system, data providing system, data- transmitting method and data-providing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RAMIG, RANDAL J.;REEL/FRAME:012592/0749 Effective date: 20020212 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034541/0477 Effective date: 20141014 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20191016 |